Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Assa Abloy Ab patents


Recent patent applications related to Assa Abloy Ab. Assa Abloy Ab is listed as an Agent/Assignee. Note: Assa Abloy Ab may have other listings under different names/spellings. We're not affiliated with Assa Abloy Ab, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Assa Abloy Ab-related inventors


Security document with transparent window

The present invention relates to a security document comprising at least an antenna and a chip connected to the antenna. The security document is characterised in that it further comprises at least one transparent window arranged such that at least a part of said antenna is visible in said window thereby forming a visible security feature.. ... Assa Abloy Ab

Sensor for identifying registration marks on a ribbon

A print section sensor for detecting registration marks on a transfer ribbon in a ribbon feed path includes a reflective sensor configured to detect the registration marks and a transmissive sensor configured to detect the registration marks. The reflective sensor is located upstream of the transmissive sensor relative to a feed direction of the transfer ribbon.. ... Assa Abloy Ab

Transmitting messages

It is presented a method for transmitting a message for a recipient, the method being performed in a message transmitter of a sender, the sender being a user of the message transmitter. The method comprises the steps of: receiving user input for a new message, the new message comprising an identifier of a recipient physical space and payload data; reading a local identifier forming part of a physical device arranged at a sender physical space, the sender physical space being associated with the sender; and sending a request to a message server to transmit the new message to the recipient physical space, wherein the request comprises the new message.. ... Assa Abloy Ab

Key device and associated method, computer program and computer program product

It is presented a key device comprising: a mechanical interface for mechanically manoeuvring a lock device upon successful access control. The mechanical interface comprises a connector for powering the lock device and for communication with the lock device such that the lock device is able to perform electronic access control using the key device. ... Assa Abloy Ab

Credential cache

It is presented a method performed for controlling access to a physical space. The method is performed in an access control device and comprises the steps of: communicating with an electronic key to authenticate the electronic key; performing a lookup of an access right using an identity of the electronic key in a credential cache when the access control device is unable to communicate with an access control server; and sending an unlock signal when the access right indicates that the electronic key should be granted access; retrieving, from the access control server, an access right indicating whether the electronic key should have access or not, when the access control device is able to communicate with the access control server; and updating the credential cache dential cache with the access right retrieved from the access control server.. ... Assa Abloy Ab

Rifd tag with a tunable antenna

The rfid tag comprises an antenna (11) connected to a wireless communication device (18). The antenna comprises a conductive planar surface and a slot (14) extending at least in a part of said conductive planar surface, the slot (14) forming a non-conductive area of the antenna and defining a first part (12) and a second part (13) of the antenna. ... Assa Abloy Ab

Methods to combine and auto-configure wiegand and rs485

An access control reader includes a credential interface and a network interface. The access control reader includes a processor coupled to the credential interface and the network interface and computer memory coupled with the processor and comprising instructions that are executable by the processor. ... Assa Abloy Ab

Method and apparatus for making a decision on a card

Method and devices for making access decisions in a secure access network are provided. The access decisions are made by one or more portable credentials using data and algorithms stored on or received by two or more credentials. ... Assa Abloy Ab

One-key vault

An access control system enabling the use of a single mobile device with a plurality of keys is described. The plurality of keys are described as being stored in a key vault that is particularly administered by a holder of the mobile device and/or an enterprise that is granting the holder of the mobile device access to enterprise assets. ... Assa Abloy Ab

Transfer lamination

In a transfer printing method using a transfer layer on a carrier layer, an image is printed over a transfer section of the transfer layer using a thermal print head and a print ribbon. At least one non-transfer portion of the transfer section is heated using the thermal print head without bonding the at least one non-transfer portion of the transfer section to the print ribbon. ... Assa Abloy Ab

Tracking for badge carrier

A tracking system is disclosed that enables the tracking of a beacon device and a credential device being held by the beacon device. The beacon device may communicate with readers of an access control system using a first communication protocol whereas the credential device being held by the beacon device may communicate with readers of the access control system using a second communication protocol. ... Assa Abloy Ab

Based on motion of device, perform or limit features

Methods, devices, and systems are provided for performing and/or limiting features based on a determined motion associated with a portable device. When the portable device is determined to be in motion, a feature control application running on the portable device prevents at least one radio frequency identification (rfid) component of the device from communicating with rfid reading devices. ... Assa Abloy Ab

Use of mobile device to configure a lock

Methods, devices, and systems are provided for configuring a reading device and/or a lock using a mobile device. The mobile device, running a configuration application, communicates with the reading device, determines a configuration of the reading device, and makes a determination for configuring the reading device based at least partially on configuration information provided by the reading device.. ... Assa Abloy Ab

Credential production device having a movable processing assembly

A credential production device includes a processing path, a transport mechanism, a processing assembly and at least one assembly guide. The transport mechanism is configured to feed individual substrates along the processing path. ... Assa Abloy Ab

05/03/18 / #20180122219

Invisible indication of duress via wearable

Methods, devices, and systems are provided for invisibly indicating duress via a wearable device. In response to determining a duress condition associated with a user exists, a duress signal is provided to components of the access control system. ... Assa Abloy Ab

05/03/18 / #20180121647

Mobile credential revocation

Managing validity status of at least one associated credential includes providing a credential manager that selectively validates associated credentials for at least one device, the device invalidating a corresponding associated credential, and the device requesting that the credential manager validate the corresponding associated credential after invalidating the associated credential. The associated credential may be invalidated based on an external event, such as a user invalidating the associated credential from a ui of the device, a user improperly entering a pin value, a user indicating that a corresponding device is lost, the device entering sleep mode, the device locking a user interface thereof, the device shutting down, and a particular time of day. ... Assa Abloy Ab

04/19/18 / #20180109386

Transaction authentication based on contextual data presentation

Methods, devices, and systems are provided for approving a transaction through an exchange of presented user contextual approval information and approval decryption. The user contextual approval information is generated by a user during a transaction, cryptographically signed, and provided to a transaction server. ... Assa Abloy Ab

04/12/18 / #20180103030

Wearable misplacement

An access control system is described in which a primary credential device has a master key and a secondary credential device has a key derived from the master key. Both the master key and the derivative key are required to gain access to the resource protected by the access control system. ... Assa Abloy Ab

04/12/18 / #20180101671

Method and apparatus for making a decision on a card

Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. ... Assa Abloy Ab

04/05/18 / #20180098364

Online peer-to-peer communication for accelerated data transmission

A method and system for facilitating machine-to-machine communications at an improved communication rate is provided. An illustrative system is disclosed to include a transmitting device, a requesting device, and a communication server that helps facilitate an online exchange of data between the transmitting device and requesting device by using information exchanged directly between the transmitting device and receiving device.. ... Assa Abloy Ab

04/05/18 / #20180097797

Method, system and device for generating, storing, using, and validating nfc tags and data

A smart tag and methods of interacting with and authenticating interactions with the same are provided. The smart tag is enabled to generate a tag authentication cryptogram (tac) and include the tac in response to a read request. ... Assa Abloy Ab

03/29/18 / #20180089920

Access control communication device, method, computer program and computer program product

It is presented an access control communication device comprising: a short distance radio communication module; a cellular radio communication module; and a controller arranged to communicate access rights associated with a key device, using the cellular radio communication module, with an access control device over a cellular communication network, the communicating comprising sending a request for access management data associated with the lock device, and receiving access management data associated with the lock device; and the controller further being arranged to transmit the access management data to the key device for transfer to the lock device, the communicating and transmitting being arranged to be performed upon the access control device being in communication with the key device using the short distance radio communication module. A corresponding method, computer program and computer program product area also presented.. ... Assa Abloy Ab

03/29/18 / #20180089915

Determining whether a user with a credential should be granted access to a physical space

It is presented a method for determining whether a user with a credential should be granted access to a physical space. The method is performed in an access control device and comprising the steps of: identifying the credential presented to the access control device; obtaining a set of at least one assignment of a permission, associated with the physical space, to external organisations from a database; determining a credential organisation being associated with the credential; and granting access when, and only when, the permission is assigned to the credential organisation.. ... Assa Abloy Ab

03/22/18 / #20180081025

Method, device, computer program and computer program product for determining whether a portable key device is located in an active area in relation to a barrier

It is presented a method for determining whether a portable key device is located in an active area in relation to a barrier. The method is performed in an access control device and comprises the steps of: detecting an angle of arrival of a wireless signal from the portable key device using a pair of antennas provided such that a line between the pair of antennas crosses the barrier; and determining whether the portable key device is located within the active area based on the angle of arrival.. ... Assa Abloy Ab

03/01/18 / #20180061156

Considering whether a portable key device is located inside or outside a barrier

It is presented an access control device for considering whether a portable key device is located inside or outside a barrier. The access control device comprises: a first antenna being configured to be directed towards the outside of the barrier with a first antenna lobe; a second antenna being configured to be directed towards the inside of the barrier with a second antenna lobe, a gain towards the outside by the second antenna is greater than a gain towards the inside by the first antenna, and the signal strength n from the portable key device using the second antenna is greater than using the first antenna at all positions of the portable key device on the inside; and a determiner arranged to consider the portable key device to be located on the outside of the barrier only when a first signal strength of a radio signal from the portable key device received by the first antenna is greater than a second signal strength of a radio signal from the portable key device received by the second antenna.. ... Assa Abloy Ab

02/22/18 / #20180052217

Method, device, computer program and computer program product for determining whether a portable key device is located in an active area in relation to a barrier

It is presented a method for determining whether a portable key device is located in an active area in relation to a barrier. The method is performed in an access control device and comprising the steps of: detecting a first angle of arrival of a wireless signal from the portable key device using a first pair of separated antennas; detecting a second angle of arrival of a wireless signal from the portable key device using a second pair of separated antennas; determining a first pair of directions based on the first angle of arrival; determining a second pair of directions based on the second angle of arrival; determining a position of the portable key device to be where one of the first pair of directions intersects one of the second pair of directions; and determining whether the portable key device is located in the active area based on the position.. ... Assa Abloy Ab

01/04/18 / #20180007041

Event driven second factor credential authentication

A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. ... Assa Abloy Ab

12/28/17 / #20170372549

Using sensor data to authenticate a user

It is presented a method for conditionally authenticating a user for access to a physical space. The method is performed in an access control device connected to a physical lock device. ... Assa Abloy Ab

12/21/17 / #20170365530

Method of producing a functional inlay and inla produced by the method

The method of manufacturing a functional inlay, comprises at least the steps of: (1) providing a substrate (7) with a wire antenna embedded therein and with an aperture (6) wherein two wire antenna portions (4,5) are positioned over said aperture (6); (2) acquiring the positions and the dimensions of said wire antenna portions (4,5) and of said aperture (6); (3) determining if the acquired positions and dimensions meet predetermined tolerances; (4) if the acquired dimensions and positions meet said tolerances, then placing a chip (1) in fie aperture (6) so that said wire portions (4,5) are positioned over connections pads (2,3) of said chip (1) and then bonding said wire portions (4,5) to said connection pads (2,3).. . ... Assa Abloy Ab

12/14/17 / #20170357791

Using sensor data to authenticate a user for a computer device

It is presented a method for conditionally authenticating a user for access to a computer device, the method being performed in an access control device connected to a computer device. The method comprises the steps of: obtaining first sensor data being based on a mobile device sensing a physical movement of a user; obtaining second sensor data being based on a stationary sensor sensing a physical movement of a user; determining whether the first sensor data matches the second sensor data; and sending a match signal to the computer device when the first sensor data matches the second sensor data.. ... Assa Abloy Ab

12/07/17 / #20170352207

Authentication of a user for access to a physical space

It is presented a method performed in a key device for authenticating a user for access to a physical space. The method comprises the steps of: detecting the presence of a lock device; sending a request for authorisation data to an access control server, the request comprising an identifier of the key device; receiving authorisation data from the access control server; determining whether the key device is authorised to open the lock device; and sending an unlock signal to the lock device when the key device is allowed to open the lock device.. ... Assa Abloy Ab

11/30/17 / #20170346634

Augmented reality security verification

Providing visual security verification includes an electronic credential of a credential holder causing credential holder information to be transmitted to an augmented reality device, superimposing the credential holder information on to a live image of an immediate environment of the augmented reality device to provide a superimposed image, where the credential holder information includes a picture of the credential holder, and providing security verification based on a comparison of the picture of the credential holder and the live image. The information may be stored in the augmented reality device and an identifier of the credential holder from the electronic credential may be used to look up the information. ... Assa Abloy Ab

11/23/17 / #20170339112

Pseudonymous proximity location device

A pseudonymous proximity location device and methods of operating and/or interacting with the same are provided. The pseudonymous proximity location device is configured to provide meaningful information to authorized reading devices but useless information to non-authorized reading devices, thereby prohibiting the use of the pseudonymous proximity location device by unauthorized reading devices.. ... Assa Abloy Ab

10/26/17 / #20170309099

Key device and associated method, computer program and computer program product

It is presented a key device comprising: a mechanical interface for mechanically maneuvering a lock device upon successful access control. The mechanical interface comprises a connector for powering the lock device and for communication with the lock device such that the lock device is able to perform electronic access control using the key device. ... Assa Abloy Ab

10/05/17 / #20170287248

First entry notification

An access control system is disclosed in which a user or guest's first entry or usage of an electronic key is reported. Reporting of the first entry or usage may include information particular to the initial transaction and may be delivered by a path that is substantially the same, but reversed, from an original key delivery path. ... Assa Abloy Ab

10/05/17 / #20170287243

Entry control system

An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a security controller having standard network interface capabilities including wee 802.x and takes advantage of the convenience and security offered by smart cards and related devices for both physical and logical security purposes. ... Assa Abloy Ab

09/14/17 / #20170262747

Tamper resistant tag

The present invention concerns a smart tag for attachment to an object. The smart tag comprises an electronic system for contactless communication, a support to which at least part of the electronic system is fixed and at least one destruction component means configured to act on at least one element of the electronic system, when the smart tag is removed from said object, to demolish said at least one element of the electronic system. ... Assa Abloy Ab

09/14/17 / #20170259583

Used transfer layer detection in a transfer printing device

A transfer printing device includes a transfer ribbon, a print unit, a mark sensor and a controller. The transfer ribbon includes a transfer layer that is attached to a carrier layer. ... Assa Abloy Ab

09/14/17 / #20170259547

Patch lamination device and method

A patch lamination device includes a laminate feed roller, a laminating roller, and a laminate spreader. The laminate feed roller is configured to feed a patch laminate ribbon along a laminate path. ... Assa Abloy Ab

09/07/17 / #20170256927

Universal mounting ring

A universal mounting ring has an arcuate or curved upper portion and a plurality of downwardly depending tabs. The universal mounting ring is configured to interface with an electrical enclosure, such as conventional electrical junction boxes to permit a radio frequency identification (rfid) reader to be secured within the enclosure and mate with a wide variety of enclosure cover assemblies manufactured by third parties. ... Assa Abloy Ab

08/24/17 / #20170244558

Trusted and unsupervised digital certificate generation using a security token

A method, system and computer program product for ensuring pki key pairs are operatively installed within a secure domain of a security token prior to generating a digital certificate. The public key component of the pki key pair is incorporated into a digital certificate which is returned to the security token for storage. ... Assa Abloy Ab

07/27/17 / #20170214528

Authenticated remote pin unblock

This invention provides a simple and secure pin unblock mechanism for use with a security token. A set of one or more passphrases are stored on a remote server during personalization. ... Assa Abloy Ab

07/06/17 / #20170195368

Uniform modular framework for a host computer system

A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. ... Assa Abloy Ab

07/06/17 / #20170193721

Key device and associated method, computer program and computer program product

It is presented a key device comprising: a mechanical interface for mechanically manoeuvring a lock device upon successful access control. The mechanical interface comprises a connector for powering the lock device and for communication with the lock device such that the lock device is able to perform electronic access control using the key device. ... Assa Abloy Ab

06/15/17 / #20170165957

Intermediate transfer film having substantially transparent alignment marks

An intermediate transfer film for use in a transfer lamination device includes a carrier layer, a transfer layer on the carrier layer, and a plurality of alignment marks supported on the carrier layer. The transfer section is configured to be transferred from the carrier layer to a substrate through a transfer lamination operation. ... Assa Abloy Ab

06/15/17 / #20170165952

Card substrate warpage reduction

Embodiments of the invention are directed to a transfer lamination process and apparatus that reduces substrate warpage. In some embodiments, the transfer lamination process is performed using a transfer lamination device, which includes a transfer unit, a substrate rotator, and a transfer ribbon having a carrier layer and a transfer layer attached to the carrier layer. ... Assa Abloy Ab

06/01/17 / #20170154175

System and method of secure data entry

A computational device having a user interface is disclosed, the user interface enables a user to securely enter data into the computational device. In particular, the user interface may include a user input portion and a user output portion. ... Assa Abloy Ab

05/11/17 / #20170132865

Access control communication device, method, computer program and computer program product

It is presented an access control communication device comprising: a short distance radio communication module; a cellular radio communication module; and a controller arranged to communicate access rights associated with a key device, using the cellular radio communication module, with an access control device over a cellular communication network, the communicating comprising sending a request for access management data associated with the lock device, and receiving access management data associated with the lock device; and the controller further being arranged to transmit the access management data to the key device for transfer to the lock device, the communicating and transmitting being arranged to be performed upon the access control device being in communication with the key device using the short distance radio communication module. A corresponding method, computer program and computer program product area also presented.. ... Assa Abloy Ab

04/27/17 / #20170118201

Cloud card application platform

A cloud card application platform is provided. The cloud card application platform enables one or more card applications to be virtualized on at least one server that is available to mobile devices via a communication network, such as the internet. ... Assa Abloy Ab

04/27/17 / #20170116798

Detecting and responding to an atypical behavior

Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided herein various mechanisms to provide a modified agent path such that an agent following the modified agent path, may update at least one non-networked reader. ... Assa Abloy Ab

04/20/17 / #20170111348

Directional sensing mechanism and communications authentication

The present invention is directed toward an rfid device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the rfid device and then selectively allow or restrict the rfid device's ability to transmit messages, which may include sensitive data, when the rfid device is placed in an rf field. ... Assa Abloy Ab

03/30/17 / #20170087870

Sensor for identifying registration marks on a ribbon

In a method of detecting a location of a print section of a transfer ribbon, the transfer ribbon is fed in a feed direction relative to a print section sensor. The print section sensor includes a reflective sensor and a transmissive sensor. ... Assa Abloy Ab

03/30/17 / #20170087819

Credential production device card substrate rotator

Some embodiments of a card rotator include a card receptacle, a feed roller, and a motor. The card receptacle is configured to rotate about a pivot access that is approximately perpendicular to a plane of a card substrate supported by the card receptacle. ... Assa Abloy Ab

03/02/17 / #20170064553

Method and system for establishing a communications pipe between a personal security device and a remote computer system

A method and a system is provided for establishing a communications path over a communications network between a personal security device (psd) and a remote computer system without requiring the converting of high-level messages such as api-level messages to psd-formatted messages such as apdu-formatted messages (and inversely) to be installed on a local client device in which the psd is connected.. . ... Assa Abloy Ab

03/02/17 / #20170061716

Retrofitted keypad and method

Methods, devices, and systems are provided for retrofitting an existing access control system with one or more supplemental access devices that add access control capabilities to the existing system. A supplemental access device can be configured as a retrofit keypad. ... Assa Abloy Ab

02/23/17 / #20170053106

Identity assurance

Confirming access for a user includes capturing an image of the user, capturing information on an identity badge worn by the user, and denying access to a resource in response to the information being inconsistent with the image. Confirming access for a user may also include denying access in response to the information being inconsistent additional information about the user stored in a database. ... Assa Abloy Ab

01/19/17 / #20170019765

Tracking for badge carrier

A tracking system is disclosed that enables the tracking of a beacon device and a credential device being held by the beacon device. The beacon device may communicate with readers of an access control system using a first communication protocol whereas the credential device being held by the beacon device may communicate with readers of the access control system using a second communication protocol. ... Assa Abloy Ab

01/19/17 / #20170017947

Trusted nfc ticketing

A system is disclosed along with a method for operating the system. In one non-limiting embodiment, the disclosed ticketing system employs a trusted tag service, which enables a customer to safely load ticketing credit onto their mobile device and provide a proof of purchase via the mobile device. ... Assa Abloy Ab

01/12/17 / #20170011287

Multiple frequency transponder with a single antenna

The present invention concerns a rfid transponder, such as a card, comprising a first chip electrically connected to a first antenna and a second chip electrically connected to a second antenna. The first antenna comprises a secondary antenna which is inductively to the second antenna.. ... Assa Abloy Ab

01/12/17 / #20170008274

Credential production device transfer ribbon accumulator

A credential production device includes a printing device, a laminating device, a transfer ribbon accumulator, a processing assembly, and a frame. The printing device is configured to print an image to the transfer ribbon. ... Assa Abloy Ab








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Assa Abloy Ab in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assa Abloy Ab with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###